First published: Wed Apr 15 2020(Updated: )
An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <=4.7 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12524 is a vulnerability discovered in Squid through version 4.7.
CVE-2019-12524 has a severity rating of critical with a CVSS score of 9.8.
The affected software for CVE-2019-12524 includes Squid versions up to and including 4.7, Debian Linux versions 9.0 and 10.0, and Canonical Ubuntu Linux versions 16.04 and 18.04.
CVE-2019-12524 allows unauthorized users to access detailed server information meant for the maintainer through the Cache Manager in Squid.
To fix CVE-2019-12524, it is recommended to update Squid to version 4.8 or apply the provided patch. Additionally, Debian and Ubuntu users should update to the specified versions of Squid.